Раздел: зарубежная компьютерная литература

Decision-Making and the Information System. Maryse Salles

Decision-Making and the Information System

Performance Evaluation by Simulation and Analysis with Applications to Computer Networks. Ken Chen

Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

Versatile Routing and Services with BGP. Colin Bookham

Versatile Routing and Services with BGP

Fiber Optics Installer (FOI) Certification Exam Guide. Bill Woodward

Fiber Optics Installer (FOI) Certification Exam Guide

E-mail and Behavioral Changes. Fernando Lagrana

E-mail and Behavioral Changes

WHOIS Running the Internet. Garth O. Bruen

WHOIS Running the Internet

Bioinformatics in Aquaculture. Группа авторов

Bioinformatics in Aquaculture

Competitive Intelligence and Decision Problems. Группа авторов

Competitive Intelligence and Decision Problems

Knowledge Needs and Information Extraction. Nicolas Turenne

Knowledge Needs and Information Extraction

Collaborative Annotation for Reliable Natural Language Processing. Kar?n Fort

Collaborative Annotation for Reliable Natural Language Processing

Security Management of Next Generation Telecommunications Networks and Services. Stuart Jacobs

Security Management of Next Generation Telecommunications Networks and Services

Transformation of Collective Intelligences. Jean-Max Noyer

Transformation of Collective Intelligences

Network Reliability. Sanjay Kumar Chaturvedi

Network Reliability

Cybersecurity. Thomas J. Mowbray

Cybersecurity

ERP and Information Systems. Tarek Samara

ERP and Information Systems

Computing Fundamentals. Faithe Wempen

Computing Fundamentals

Linux Server Security. Chris Binnie

Linux Server Security

The Image-Interface. Everardo Reyes-Garcia

The Image-Interface

Content Delivery Networks. Dom Robinson

Content Delivery Networks

Cyber-Risk Informatics. Mehmet Sahinoglu

Cyber-Risk Informatics

Threat Modeling. Adam Shostack

Threat Modeling

Artificial Immune System. Ying Tan

Artificial Immune System

Network Attacks and Exploitation. Matthew Monte

Network Attacks and Exploitation

Interactions on Digital Tablets in the Context of 3D Geometry Learning. David Bertolo

Interactions on Digital Tablets in the Context of 3D Geometry Learning

The Art of War in the Network Age. Joseph Henrotin

The Art of War in the Network Age

The Network Security Test Lab. Michael Gregg

The Network Security Test Lab

Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data. EMC Services Education

Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data

Android Hacker's Handbook. Zach  Lanier

Android Hacker's Handbook

Cyber Security Policy Guidebook. Jennifer L. Bayuk

Cyber Security Policy Guidebook

Advanced Internet Protocols, Services, and Applications. Christian Vogt

Advanced Internet Protocols, Services, and Applications

Stories that Move Mountains. Martin Sykes

Stories that Move Mountains

Electronic Health Record. Pradeep K. Sinha

Electronic Health Record

Software Metrics and Software Metrology. Alain  Abran

Software Metrics and Software Metrology

System Design for Telecommunication Gateways. Alexander  Bachmutsky

System Design for Telecommunication Gateways

Cloud Computing. Группа авторов

Cloud Computing

Computing Networks. Pascale Vicat-Blanc

Computing Networks

Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies. Granino Korn A.

Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies

Information Security. Principles and Practice. Mark  Stamp

Information Security. Principles and Practice

Biomolecular Networks. Luonan Chen

Biomolecular Networks

Reversible Computing. Fundamentals, Quantum Computing, and Applications. Alexis Vos De

Reversible Computing. Fundamentals, Quantum Computing, and Applications

Energy Security. An Interdisciplinary Approach. Gawdat  Bahgat

Energy Security. An Interdisciplinary Approach

Public Key Cryptography. Applications and Attacks. Lynn Batten Margaret

Public Key Cryptography. Applications and Attacks

Бюджетирование и финансовые расчеты с помощью Microsoft Excel. Кевин Скотт Проктор

Бюджетирование и финансовые расчеты с помощью Microsoft Excel

Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation. Kostadinov Todor Pavlov

Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation

Technical Writing for Teams. The STREAM Tools Handbook. Mamishev Alexander

Technical Writing for Teams. The STREAM Tools Handbook

Handbook of eID Security. Concepts, Practical Experiences, Technologies. Fumy Walter

Handbook of eID Security. Concepts, Practical Experiences, Technologies

Graph Partitioning. Bichot Charles-Edmond

Graph Partitioning

IPv6 Deployment and Management. Dooley Michael

IPv6 Deployment and Management

Software Evolution and Maintenance. Naik Kshirasagar

Software Evolution and Maintenance

Sound Visualization and Manipulation. Choi Jung-Woo

Sound Visualization and Manipulation

  • 1
  • ...
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • ...
  • 49